The United States is “losing the cyber espionage war” against China, Russia and other countries, but even in the face of such a grave threat the country cannot agree on how to protect its precious intellectual seed capital from these predations, the chairman of the House Intelligence Committee says.
“We are running out of time on this,” Rep. Mike Rogers, respected for working closely with his ranking member, said in a speech at today’s Intelligence and National Security Alliance‘s (INSA) cyber conference here. Keep reading →
As the Senate reconvenes to debate the Lieberman-Collins cybersecurity bill, President Obama himself has set the stakes in terms of preventing a future catastrophic attack. But some say the real and present danger is what’s happening under our noses right now, in an online theft of intellectual property that Cyber Command chief Gen. Keith Alexander called “the greatest transfer of wealth in history.” Keep reading →
Cloud computing leaders from the governments of Canada, China, Japan and the United States pledged their continued international cooperation to fulfill cloud computing‘s potential to transform public services worldwide.
The leaders made their comments, while also touching on a range of legal, security and data standards issues during an executive session at the 5th annual Cloud Computing Forum & Workshop, sponsored by the National Institute of Standards and Technology (NIST) Tuesday. Keep reading →
The Ministry of Defence Main Building in London.
Information became public last week about another successful cyber attack. While that has become the norm, what makes this different is that this successful attack hit the UK Ministry of Defence’s Top Secret System. Keep reading →
The Stuxnet computer worm that damaged Iranian nuclear facilities – widely suspected to be an Israeli or even U.S. covert action – was a model of a responsibly conducted cyber-attack, said the top lawyer for the U.S. military’s Cyber Command, Air Force Col. Gary Brown. By contrast, the Chinese stance, which holds that the international law of armed conflict does not apply in cyberspace, opens the door for indiscriminate online actions launched with less concern for collateral damage than was evident in Stuxnet, he warned, while a joint Russo-Chinese proposal for international collaboration on cyber-security could potentially threaten free speech.
Brown emphasized that his remarks represented his own opinion and that he was not speaking for the U.S. government, but they still open a window into the thinking of an influential official on the cutting edge of policymaking on cyber war. Keep reading →
Federal Communications Commission Chairman Julius Genachowski today called upon the nation’s Internet Service Providers (ISPs) to “take concrete steps” to improve Internet security for consumers and critical infrastructure, warning that a failure to do so could slow broadband adoption and threaten the nation’s economy.
With more than $8 trillion exchanged electronically every year, Genachowski warned that sophisticated hackers are gaining the expertise to “shut down the Internet…shut down our economy [and] compromise our growth engine.” Keep reading →
Republican presidential hopeful Mitt Romney, speaking to nearly 1,000 technology executives in Northern Virginia earlier today, called on the federal government and the nation at large to re-embrace a national spirit of innovation, or risk seeing the decline of nation’s global economic and political stature.
“If we are to remain the strongest nation on Earth, we must remain the most innovative nation on Earth,” he said. Keep reading →
It is getting to the point that those reporting acts of cyber aggression, particularly in the area of cyber espionage, think they are in a repetitive do-loop. It is the same story over and over again with the only difference being the list of victims.
The news of late has been the discovery of yet another sophisticated cyber attack that resulted in the collection of untold information, some general some sensitive, from the business community as well as defense contractors and government officials. Keep reading →
Commercial satellites capable of photographing objects a half-meter wide with stunning clarity from 423 miles above the Earth have become a routine part of the analysis picture for the 17 government agencies that make up the intelligence community.
But high resolution satellite images are also gaining wider application at a variety of other federal agencies, from the U.S. Geological Survey for precision mapping to the Federal Emergency Management Agency to assess disaster response strategies. Keep reading →
COMMENTARY: The history of espionage activities, both for and against the United States goes back to early formative stages of the country. The tools and techniques associated with the tradecraft of spying have changed over time and kept up with modern society.
Today, China’s espionage activities/targets go far beyond government and military targets and now include leading private sector technology companies. Acts of espionage that have been attributed to China are said to have reached new “intolerable levels”. Representative Mike Rogers of Michigan, chairman of the House Intelligence Committee, said that “Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop.” He went on to pretty much DEMAND the FBI provide answers! Keep reading →